5. AFRICACRYPT 2012: Ifrance, Morocco

Signature Schemes

Stream Ciphers

Applications of Information Theory

Block Ciphers

Network Security Protocols

Public-Key Cryptography

Cryptanalysis of Hash Functions

Hash Functions: Design and Implementation

Algorithms for Public-Key Cryptography

Cryptographic Protocols

Invited Talks

maintained by Schloss Dagstuhl LZI at University of Trier